Censorship and Surveillance During Hong Kong's Umbrella Movement

Total Page:16

File Type:pdf, Size:1020Kb

Censorship and Surveillance During Hong Kong's Umbrella Movement Illinois State University ISU ReD: Research and eData Theses and Dissertations 3-14-2016 In The Shadow Of The Great Firewall: Censorship And Surveillance During Hong Kong's Umbrella Movement Christine Andrelczyk Illinois State University, [email protected] Follow this and additional works at: https://ir.library.illinoisstate.edu/etd Part of the Asian Studies Commons, Political Science Commons, and the Quantitative, Qualitative, Comparative, and Historical Methodologies Commons Recommended Citation Andrelczyk, Christine, "In The Shadow Of The Great Firewall: Censorship And Surveillance During Hong Kong's Umbrella Movement" (2016). Theses and Dissertations. 488. https://ir.library.illinoisstate.edu/etd/488 This Thesis is brought to you for free and open access by ISU ReD: Research and eData. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of ISU ReD: Research and eData. For more information, please contact [email protected]. IN THE SHADOW OF THE GREAT FIREWALL: CENSORSHIP AND SURVEILLANCE DURING HONG KONG’S UMBRELLA MOVEMENT Christine Andrelczyk 80 Pages Through a case-study analysis, this project investigates why the People’s Republic of China eschewed overtly repressive tactics and instead relied on subtle methods of coercion, such as surveillance and censorship, to mitigate activism during Hong Kong’s pro-democracy Umbrella Movement. Drawing on historical evidence, reports, and quantitative data, this research explores the significance of subtle repression and coercion as it relates to the process of authoritarian consolidation in China and Hong Kong. KEYWORDS: Censorship, Hong Kong, Informational Communication Technologies, Umbrella Movement IN THE SHADOW OF THE GREAT FIREWALL: CENSORSHIP AND SURVEILLANCE DURING HONG KONG’S UMBRELLA MOVEMENT CHRISTINE ANDRELCZYK A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE Department of Politics and Government ILLINOIS STATE UNIVERSITY 2016 Copyright 2016 Christine Andrelczyk IN THE SHADOW OF THE GREAT FIREWALL: CENSORSHIP AND SURVEILLANCE DURING HONG KONG’S UMBRELLA MOVEMENT CHRISTINE ANDRELCZYK COMMITTEE MEMBERS: Michaelene Cox, Chair Osaore Aideyan Noha Shawki CONTENTS Page CONTENTS i CHAPTER I. INTRODUCTION 1 II. REVIEW OF RELATED LITERATURE 10 ICTs and autocracy 13 Empowering the government 13 A cautious take 20 ICTs: Destabilizing autocracy 23 III. THEORY 29 Authoritarian consolidation 29 Collective action 34 IV. RESEARCH DESIGN AND METHODS 39 V. BACKGROUND AND CONTEXT 42 Timeline of events 47 Role of ICTs in the Umbrella Movement 49 Censorship 49 Surveillance 52 VI. ANALYSIS 56 VII. CONCLUSION 67 REFERENCES 73 i CHAPTER I INTRODUCTION A group of university students quietly sat down in front of a government building in Hong Kong’s Admiralty district on September 26, 2014. A few weeks earlier, Hong Kong media outlets had announced that the dialogue between Mainland China and Hong Kong regarding electoral reforms had fallen through. The Standing Committee of the National People’s Congress, China’s de facto legislature, ostensibly approved of Hong Kong’s bid for national elections with one major caveat: All candidates must be hand- selected by the communist authorities in Beijing. “This is a fake democratic proposal,” remarked Hong Kong lawmaker Albert Chan, echoing the sentiments of thousands of disgruntled and disappointed Hong Kong residents.1 The student sit-in at the Admiralty building was the culmination of a week-long boycott organized by student groups Scholarism and the Hong Kong Federation of Students. Scholarism’s teenage leader, Joshua Wong, explained in a call to action that: “Political reform is the core problem for every issue. Everyone knows that under the Chinese Communist party, there is a lack of possibility to fight [for] true universal suffrage in the end…but students should stand on the front line in every century.”2 Just 1 Tiffany Ap, “Can Hong Kong’s July 1 pro-democracy march energize political reform bid?” CNN, July 1, 2015, http://www.cnn.com/2015/07/01/asia/hong-kong-july-democracy-march/ 2 Demetri Sevastopulo, “Teenager Joshua Wong picks up democracy baton in Hong Kong,” Financial Times, September 22, 2014, http://www.ft.com/intl/cms/s/0/9d52261c-421e-11e4-9818- 00144feabdc0.html#axzz3fDoGeZ4z 1 two days later, the students were joined by thousands of protestors as they marched through the streets of Hong Kong’s glittering, high-tech commercial district. Activists blocked key intersections, paralyzing traffic, as riot police launched canisters of tear gas into the peaceful crowd. In response to the noxious gas, activists raised umbrellas painted with pro-democracy messages, and thus the Umbrella Movement was born.3 To some, this scene might appear reminiscent of images of demonstrators in Egypt and Iran in the preceding years, where young people took to the streets amidst a storm of tweets, texts, and blog posts. The Arab Spring movement of 2011 ignited an ongoing discussion about the role of communication technology in social movements, causing journalists and scholars alike to examine how platforms like mobile phone technology and the internet could be harnessed by activists in order to disseminate pro- democratic messages and mobilize against authoritarian regimes. Egyptian president Hosni Mubarak was ousted in less than three weeks in a relatively bloodless revolution after millions of activists took to social media to express their discontent and organize mass protests. The 2009 election protest in Iran and the 2011 revolution in Tunisia were described as “Twitter revolutions,” a name referencing the primary instrument utilized by activists. When Hong Kong’s Umbrella Movement burst onto the international stage in 2014, one might have assumed that, like in Egypt and Tunisia in the years prior, the collective fervor of youthful activists would flood the streets and social media in equal measure and ultimately lead to another major victory for democracy. But that never happened, largely based on China’s skillful handling of the movement. 3 “Hong Kong protests: Timeline of the occupation,” BBC News, December 11, 2014, http://www.bbc.com/news/world-asia-china-30390820. 2 The Umbrella movement was in fact just the most recent of a series of protests stretching back to 2003 when pro-democracy activists first expressed their discontent with the encroaching authoritarian policies of Mainland China. These protests largely spark from the struggle between Hong Kong to exert a higher degree of democratic self- rule and China’s policy of centralized control. Specifically, the issues of free elections and freedom of expression have generated a high degree of public contention. Although the frequency of Hong Kong’s protests could lead observers to believe otherwise, Hong Kong is not administered by a regime that encourages free political discourse or permits government criticism. Restrictive policies imposed by the People’s Republic of China are geared towards limiting the transmission of information deemed controversial, politically sensitive, or anti-government. Individuals found participating in subversive communications could realistically face arrest and imprisonment.4 On a larger scale, the government has openly engineered mass internet blackouts in regions of China embroiled in social unrest where demonstrations are believed to have been organized using technology like the internet and mobile phones. Despite such restrictions, Hong Kong has experienced a number of mass protests since 1997. This raises questions regarding how communication can be used as a tool to either advance or limit democratic progress in social movements like the Umbrella protest. Additionally, one may ask why recent social movements in Egypt and Tunisia succeeded while Hong Kong’s did not, despite activists having very similar digital tools at their disposal. 4 Francis L. F. Lee and Joseph M. Chan, "Professionalism, Political Orientation, and Perceived Self- Censorship: A Survey Study of Hong Kong Journalists" (Paper presented at the annual meeting of the International Communication Association, TBA, Montreal, Quebec, Canada, May 21, 2008). 3 The relationship between communication technology and social movements is far from novel. Johannes Gutenberg’s invention of the printing press in 1450 demonstrates how technological change can facilitate social change. His invention is credited with playing a key developmental role in the Renaissance, Reformation, and Scientific Revolution. More recently, Radio Free Europe was nominated for a Nobel Peace Prize in 1991 for its role in bringing down the Iron Curtain.5 Within the last decade, information and communication technologies (ICTs) have been lauded by some as a voice piece of the oppressed and tool for liberation, prompting prominent figures like Egyptian activist and Google Entrepreneur Wael Ghonim to espouse, “if you want to liberate a society, just give them the internet.”6 Yet despite the rallying power of digital communication, Freedom House reported in 2015 that more countries experienced declines in freedom than gains for the ninth consecutive year despite global surges in internet and mobile phone connectivity.7 Freedom House additionally reported a major increase in surveillance and overall decline in internet freedom, despite more people than ever being connected to the web.8 5 Evgeny Morozov, The Net Delusion: The Dark Side of Internet Freedom (New York: Public Affairs, 2012), 20. 6 Jürgen Habermas, The Theory of Communicative
Recommended publications
  • Internet Surveillance in China
    The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks.
    [Show full text]
  • “State of Civil Society Report: 2015
    the year in review State of Civil Society report 2015: THE YEAR IN REVIEW ...these stories tell us that only civil introduction society, in its broadest sense, is taking a It has been another year of hard work and high achievement for civil society. The story of the year since the stance against the 2014 State of Civil Society Report was published has partly been one of a continuing series of attacks on civil concentration of society in the many countries where, when civil society asks difficult questions about power, the powerful seek to silence it. But is has also been a story of impressive and sustained civil society response, in a world that has power in the hands of become more turbulent and contested. a tiny, global, super- rich elite, and against As we show below, civil society faces challenges - of lack of space, under-resourcing and limited access to the attempts of many decision-makers. Civil society also needs continually to prove its connection with and relevance to citizens, political leaders and and it needs to demonstrate its ability to stay ahead of trends and innovate. When civil society groups do not corporate interests do these, they fail. But so often, we see civil society leading the response to crisis, taking on difficult issues, contributing to change, and winning arguments for social justice. to undermine human rights and This year in review section of the 2015 CIVICUS State of Civil Society Report is complemented by our report’s the value of people’s special thematic section on the resourcing for civil society, and the 27 guest contributions, from civil society participation.
    [Show full text]
  • Silencing Hong Kong's National Anthem Protests Will Deepen Fear, Not Love, of China
    Hong Kong anthem insult law will deepen fear, not love, of Chi... https://qz.com/1541104/silencing-hong-kongs-national-anthem-p... BUILD A NEW WALL Silencing Hong Kong’s national anthem protests will deepen fear, not love, of China By Vivienne Chow • February 19, 2019 REUTERS A proposed law that aims to promote respect for one song is causing anxiety to many in Hong Kong about what is expected of them whenever they hear that melody in future. 1 of 8 19/01/20, 12:54 pm Hong Kong anthem insult law will deepen fear, not love, of Chi... https://qz.com/1541104/silencing-hong-kongs-national-anthem-p... The song is March of the Volunteers, the national anthem of the People’s Republic of China. Recently, the Hong Kong government tabled a bill (pdf) that mirrors one enacted in mainland China in 2017. It stipulates how the national anthem should be played and sung, and that schools—including international schools—bear the responsibility of teaching students the song. It proposes making intentional public insults of the anthem a criminal offense that can be punished by up to three years in jail and up to HK$50,000 ($6,380) in fines. The bill will be further discussed at the Legislative Council today (Feb. 19) and debated in coming months before the law is enacted, possibly as soon as July. In the US, the Flag Code prescribes etiquette related to the national flag and anthem. But it is a code of practice, not a law like the one proposed in Hong Kong that could send those breaching it to jail.
    [Show full text]
  • 2014-2015 Report on Police Violence in the Umbrella Movement
    ! ! ! ! ! 2014-2015 Report on Police Violence in the Umbrella Movement A report of the State Violence Database Project in Hong Kong Compiled by The Professional Commons and Hong Kong In-Media ! ! ! Table!of!Contents! ! About!us! ! About!the!research! ! Maps!/!Glossary! ! Executive!Summary! ! 1.! Report!on!physical!injury!and!mental!trauma!...........................................................................................!13! 1.1! Physical!injury!....................................................................................................................................!13! 1.1.1! Injury!caused!by!police’s!direct!smacking,!beating!and!disperse!actions!..................................!14! 1.1.2! Excessive!use!of!force!during!the!arrest!process!.......................................................................!24! 1.1.3! Connivance!at!violence,!causing!injury!to!many!.......................................................................!28! 1.1.4! Delay!of!rescue!and!assault!on!medical!volunteers!..................................................................!33! 1.1.5! Police’s!use!of!violence!or!connivance!at!violence!against!journalists!......................................!35! 1.2! Psychological!trauma!.........................................................................................................................!39! 1.2.1! Psychological!trauma!caused!by!use!of!tear!gas!by!the!police!..................................................!39! 1.2.2! Psychological!trauma!resulting!from!violence!...........................................................................!41!
    [Show full text]
  • Hong Kong’S Summer of Protest
    TABLE OF CONTENTS Video Summary & Related Content 3 Video Review 4 Before Viewing 5 While Viewing 6 Talk Prompts 8 After Viewing 12 The Story 14 ACTIVITY #1: Protest tactics 19 ACTIVITY #2: Types of Government 22 Sources 23 Video Review – While Viewing (Responses) 24 CREDITS News in Review is produced by Visit www.curio.ca/newsinreview for an archive CBC NEWS and curio.ca of all previous News In Review seasons. As a companion resource, go to www.cbc.ca/news GUIDE for additional articles. Writer/editor: Sean Dolan Additional editing: Michaël Elbaz CBC authorizes reproduction of material VIDEO contained in this guide for educational Host: Michael Serapio purposes. Please identify source. Senior Producer: Jordanna Lake News In Review is distributed by: Supervising Manager: Laraine Bone curio.ca | CBC Media Solutions © 2019 Canadian Broadcasting Corporation BATTLING BEIJING: Hong Kong’s Summer of Protest Video duration – 14:48 In the spring of 2019 Beijing announced an extradition bill that would have allowed Hong Kong residents to be extradited and tried in Communist mainland China. That led to growing protests demanding the withdrawal of the bill. Frustrations mounted and so did the use of force on both sides. As crowds grew into the millions, Chinese officials used tear gas, water canons and rubber bullets, eventually resorting to the threat of military intervention to quelch demonstrations. Thirteen weeks in and the citizens of Hong Kong remained steadfast. Then, on September 3rd the Beijing government bowed to the protestors' primary demand and the bill was withdrawn. But where that leaves Hong Kong now remains unclear.
    [Show full text]
  • Retweeting Through the Great Firewall a Persistent and Undeterred Threat Actor
    Retweeting through the great firewall A persistent and undeterred threat actor Dr Jake Wallis, Tom Uren, Elise Thomas, Albert Zhang, Dr Samantha Hoffman, Lin Li, Alex Pascoe and Danielle Cave Policy Brief Report No. 33/2020 About the authors Dr Jacob Wallis is a Senior Analyst working with the International Cyber Policy Centre. Tom Uren is a Senior Analyst working with the International Cyber Policy Centre. Elise Thomas is a Researcher working with the International Cyber Policy Centre. Albert Zhang is a Research Intern working with the International Cyber Policy Centre. Dr Samanthan Hoffman is an Analyst working with the International Cyber Policy Centre. Lin Li is a Researcher working with the International Cyber Policy Centre. Alex Pascoe is a Research Intern working with the International Cyber Policy Centre. Danielle Cave is Deputy Director of the International Cyber Policy Centre. Acknowledgements ASPI would like to thank Twitter for advanced access to the takedown dataset that formed a significant component of this investigation. The authors would also like to thank ASPI colleagues who worked on this report. What is ASPI? The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI International Cyber Policy Centre ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy.
    [Show full text]
  • Effective Censorship: Maintaining Control in China
    University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice.
    [Show full text]
  • Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy
    Working Paper No. 2017.2 Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy Nicholas J. Monaco, Google Jigsaw Table of Contents Abstract ....................................................................................................................... 3 Introduction ................................................................................................................. 3 Case study ................................................................................................................... 5 Media and social media landscape in Taiwan ................................................................... 5 Overview of computational propaganda in Taiwan .......................................................... 9 Automation and propaganda .......................................................................................... 10 Fake news ........................................................................................................................ 13 Cross-Strait propaganda ................................................................................................. 15 The 2016 Diba Facebook expedition .............................................................................. 22 Conclusion ................................................................................................................. 25 About the Author ...................................................................................................... 27 References ................................................................................................................
    [Show full text]
  • How the Chinese Government Fabricates Social Media Posts
    American Political Science Review (2017) 111, 3, 484–501 doi:10.1017/S0003055417000144 c American Political Science Association 2017 How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument GARY KING Harvard University JENNIFER PAN Stanford University MARGARET E. ROBERTS University of California, San Diego he Chinese government has long been suspected of hiring as many as 2 million people to surrep- titiously insert huge numbers of pseudonymous and other deceptive writings into the stream of T real social media posts, as if they were the genuine opinions of ordinary people. Many academics, and most journalists and activists, claim that these so-called 50c party posts vociferously argue for the government’s side in political and policy debates. As we show, this is also true of most posts openly accused on social media of being 50c. Yet almost no systematic empirical evidence exists for this claim https://doi.org/10.1017/S0003055417000144 . or, more importantly, for the Chinese regime’s strategic objective in pursuing this activity. In the first large-scale empirical analysis of this operation, we show how to identify the secretive authors of these posts, the posts written by them, and their content. We estimate that the government fabricates and posts about 448 million social media comments a year. In contrast to prior claims, we show that the Chinese regime’s strategy is to avoid arguing with skeptics of the party and the government, and to not even discuss controversial issues. We show that the goal of this massive secretive operation is instead to distract the public and change the subject, as most of these posts involve cheerleading for China, the revolutionary history of the Communist Party, or other symbols of the regime.
    [Show full text]
  • The Danger of Deconsolidation Roberto Stefan Foa and Yascha Mounk Ronald F
    July 2016, Volume 27, Number 3 $14.00 The Danger of Deconsolidation Roberto Stefan Foa and Yascha Mounk Ronald F. Inglehart The Struggle Over Term Limits in Africa Brett L. Carter Janette Yarwood Filip Reyntjens 25 Years After the USSR: What’s Gone Wrong? Henry E. Hale Suisheng Zhao on Xi Jinping’s Maoist Revival Bojan Bugari¡c & Tom Ginsburg on Postcommunist Courts Clive H. Church & Adrian Vatter on Switzerland Daniel O’Maley on the Internet of Things Delegative Democracy Revisited Santiago Anria Catherine Conaghan Frances Hagopian Lindsay Mayka Juan Pablo Luna Alberto Vergara and Aaron Watanabe Zhao.NEW saved by BK on 1/5/16; 6,145 words, including notes; TXT created from NEW by PJC, 3/18/16; MP edits to TXT by PJC, 4/5/16 (6,615 words). AAS saved by BK on 4/7/16; FIN created from AAS by PJC, 4/25/16 (6,608 words). PGS created by BK on 5/10/16. XI JINPING’S MAOIST REVIVAL Suisheng Zhao Suisheng Zhao is professor at the Josef Korbel School of International Studies, University of Denver. He is executive director of the univer- sity’s Center for China-U.S. Cooperation and editor of the Journal of Contemporary China. When Xi Jinping became paramount leader of the People’s Republic of China (PRC) in 2012, some Chinese intellectuals with liberal lean- ings allowed themselves to hope that he would promote the cause of political reform. The most optimistic among them even thought that he might seek to limit the monopoly on power long claimed by the ruling Chinese Communist Party (CCP).
    [Show full text]
  • The Internet Beyond Borderless Versus Balkanized
    POROUS TERRITORIES: THE INTERNET BEYOND BORDERLESS VERSUS BALKANIZED LUKE MUNN Western Sydney University (Australia) [email protected] Abstract: If the internet was once viewed as a borderless realm, critics now warn it is in danger of being “balkanized”, splintering into nationalized fragments. Certainly nation-states increasingly see the Internet as “their” internet, a national space to be regulated and actively shaped. The first half of this article charts the technologies that appear to place this vision within reach: data localization, internet shutdowns, and internet filtering. These moves promise to exert sovereign control, to make the inter- net an extension of national territory. Yet by drawing on two recent events in China, this article argues that these territories are messy and their borders are permeable. Pro-government activists jump across the firewall in order to attack individuals and organizations who threaten the stability and security of their motherland. Simultane- ously, individuals scale the firewall in order to question the party line and express solidarity with democratic movements, undermining the political and technical boundaries established by their nation. Internet architectures create a condition where territorialization is constantly being both amplified and undermined by “extra- territorial” activities. These practices demonstrate the everyday porosity of internet territories, providing a messier portrait that goes beyond the dichotomy of borderless vs balkanized. Keywords: territory, fragmentation, balkanization, internet, China. When nations speak of the internet today, they no longer use the language of the virtual, but of soil. At the dawn of the internet, cyberspace was framed as a new realm decoupled from the state. This digital sphere stretched across the globe, making it essentially ungovernable.
    [Show full text]
  • A Case Study of Hong Kong SAR and Its Implications to Chinese Foreign Policy
    Paradiplomacy and its Constraints in a Quasi-Federal System – A Case Study of Hong Kong SAR and its Implications to Chinese Foreign Policy Wai-shun Wilson CHAN ([email protected]) Introduction Thank for the Umbrella Movement in 2014, Hong Kong has once again become the focal point of international media. Apart from focusing the tensions built among the government, the pro-Beijing camp and the protestors on the pathway and the pace for local democratization, some media reports have linked the movement with the Tiananmen Incident, and serves as a testing case whether “One Country, Two Systems” could be uphold under the new Xin Jinping leadership.1 While academics and commentators in Hong Kong and overseas tend to evaluate the proposition from increasing presence of Beijing in domestic politics and the decline of freedoms and rights enjoyed by civil society,2 little evaluation is conducted from the perspective of the external autonomy enjoyed by Hong Kong under “One Country, Two Systems”. In fact, the Sino-British Joint Declaration and the subsequent Basic Law have defined and elaborated the scope of Hong Kong’s autonomy in conducting external relations ‘with states, regions and relevant international organizations.’ 3 It is therefore tempted to suggest that the external autonomy enjoyed by Hong Kong SAR Government serves as the other pillar of “One Country, Two Systems”, giving an unique identity of Hong Kong in global politics which may be different from that possessed by mainland China. Though officially “One Country, Two Systems” practiced in Hong Kong (and Macao) is not recognized by Beijing as a federal arrangement between the Central People’s Government and Hong Kong SAR Government, the internal and external autonomy stipulated in the Basic Law gives Hong Kong similar, to some extent even more, power as a typical federated unit.
    [Show full text]